Exam 6: Risk Management: Identifying and Assessing Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The secretarial community often takes on the leadership role in addressing risk.____________

(True/False)
4.9/5
(47)

What should the prioritized list of assets and their vulnerabilities and the prioritized list of threats facing the organization be combined to create?

(Multiple Choice)
4.8/5
(28)

Having an established risk management program means that an organization's assets are completely protected.

(True/False)
4.7/5
(37)

Which of the following is an example of a technological obsolescence threat?

(Multiple Choice)
4.9/5
(27)

Assigns a risk-rating ranked value to each uncontrolled asset-vulnerability pair.

(Multiple Choice)
4.9/5
(39)

List the stages in the risk identification process in order of occurrence.

(Essay)
4.9/5
(38)

A formal access control methodology used to assign a level ofconfidentiality to an information asset and thus restrict the number of people who can access it is known as a data categorization scheme.____________

(True/False)
4.8/5
(37)

Classification categories must be mutually exclusive and which of the following?

(Multiple Choice)
4.8/5
(35)

Remains even after current control has been applied.

(Multiple Choice)
4.9/5
(37)

For the purposes of relative risk assessment how is risk calculated?

(Essay)
4.8/5
(34)

An evaluation of the threats to information assets,including adetermination of their potential to endanger the organization is known as exploit assessment.____________

(True/False)
4.7/5
(38)

Labels that must be comprehensive and mutually exclusive.

(Multiple Choice)
4.9/5
(37)

What is defined as specific avenues that threat agents can exploit to attack an information asset?

(Multiple Choice)
4.8/5
(37)

Which of the following is a network device attribute that may be used in conjunction with DHCP,making asset-identification using this attribute difficult?

(Multiple Choice)
5.0/5
(35)

The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability are each examples of _____.

(Multiple Choice)
4.9/5
(39)

What should you be armed with to adequately assess potential weaknesses in each information asset?

(Multiple Choice)
4.9/5
(30)

An approach to combining risk identification,risk assessment,and risk appetiteinto a single strategy.is known as risk protection.___________

(True/False)
4.9/5
(46)

Some threats can manifest in multiple ways,yielding multiple exploits for an asset-threat pair. ____________ ​

(True/False)
4.9/5
(37)

As each information asset is identified,categorized,and classified,a ________ value must also be assigned to it.

(Short Answer)
4.8/5
(33)

The recognition,enumeration,and documentation of risks to anorganization's information assets.

(Multiple Choice)
4.7/5
(41)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)